Page MenuHomePhabricator

EMill-WMF (Eric Mill)
Group Product Manager, Safety and Security

Today

  • No visible events.

Tomorrow

  • No visible events.

Tuesday

  • No visible events.

User Details

User Since
Feb 4 2025, 7:48 PM (61 w, 5 d)
Availability
Available
LDAP User
Unknown
MediaWiki User
EMill-WMF [ Global Accounts ]

I lead WMF's Product Safety and Integrity team. We work on things like bot detection, temporary accounts, two-factor authentication, and overall product security and anti-abuse work.

@konklone is my older personal account, and shouldn't be tagged into things related to my WMF work.

Recent Activity

Fri, Apr 10

EMill-WMF added a comment to T422884: Request for temporary CSP whitelisting of Cornell research endpoint (grandfathering existing user script).

Could you share more about the purpose of the study, why it needs to live-connect in the client to Cornell's servers, and the roadblocks you encountered in porting it to Toolforge?

Fri, Apr 10, 1:55 AM · 2026-user-javascript-incident, Product Safety and Integrity, ContentSecurityPolicy

Sun, Apr 5

EMill-WMF added a comment to T422312: For very high-risk actions, require approvals from 2 distinct people.

We're focused right now on platform-based protections (namely re-authentication), rather than introducing more social coordination. That's a development focus for us for the next few months.

Sun, Apr 5, 2:35 PM · Product Safety and Integrity, CheckUser, MediaWiki-User-Interface, 2026-user-javascript-incident, Security

Tue, Mar 31

EMill-WMF added a comment to T419265: CSP adjustments related to the 2026 user javascript incident.

I am designing a gadget that will make a request to one of the allowed hosts in the CSP! Can you clarify whether *.wmcloud.org are intended to remain allowed in the enforced CSP long-term, or whether the report-only policy is expected to become stricter in a way that would block these requests later?

Tue, Mar 31, 2:10 AM · Sustainability (Incident Followup), User-notice, 2026-user-javascript-incident, Product Safety and Integrity, ContentSecurityPolicy

Thu, Mar 26

EMill-WMF added a comment to T260637: Discuss future of BotPasswords/OAuth IP "restrictions".

It's fine with me to make this public if there's no longer any security issue, and it's starting to be referenced in other public tickets.

Thu, Mar 26, 10:48 PM · MediaWiki-Platform-Team, Platform Engineering, MediaWiki-User-management, MediaWiki-extensions-OAuth, Security

Wed, Mar 25

EMill-WMF closed T421033: Request for CSP allowance for usage on Chinese Wikipedia, a subtask of T419265: CSP adjustments related to the 2026 user javascript incident, as Declined.
Wed, Mar 25, 3:18 PM · Sustainability (Incident Followup), User-notice, 2026-user-javascript-incident, Product Safety and Integrity, ContentSecurityPolicy
EMill-WMF closed T421033: Request for CSP allowance for usage on Chinese Wikipedia as Declined.

After reviewing the community discussion, and the domains in the list, we don't think this is a compelling case to add to the allowlist. We recommend exploring alternative approaches to hosting content first, as was also raised by community members in that discussion.

Wed, Mar 25, 3:18 PM · Chinese-Sites, ContentSecurityPolicy, 2026-user-javascript-incident

Tue, Mar 24

EMill-WMF added a comment to T419265: CSP adjustments related to the 2026 user javascript incident.

Is it possible to generate a list of requested domains that are being blocked by the CSP, in some browsable way?

Rather than requiring every tool-user to figure out how to find phab and report the problem, we should be able to track down which tools are still blocked and proactively unbreak ones that are pinging trusted domains or using otherwise known services; or at the least reach out to tool-maintainers whose tools are broken to streamline a resolution.

Tue, Mar 24, 8:06 PM · Sustainability (Incident Followup), User-notice, 2026-user-javascript-incident, Product Safety and Integrity, ContentSecurityPolicy

Mar 13 2026

EMill-WMF added a comment to T419559: d:User:Lectrician1/discographies3.js & d:User:Lectrician1/embeds.js no longer working following CSP deployment.

We are generally trying to unbreak things, but this is a pretty heavy set of domains. Could someone provide a little rationale for why all of these domains need to be pulled in live client-side?

Mar 13 2026, 9:32 PM · Sustainability (Incident Followup), SecTeam-Processed, Security-Team, Product Safety and Integrity, 2026-user-javascript-incident, ContentSecurityPolicy
EMill-WMF added a comment to T399644: FY2025-26 WE4.6.2 Multiple Authenticators.

@andritolion Thanks - we do have https://phabricator.wikimedia.org/T416159 for this, as a subtask here. It is planned at some point, we plan to lean more heavily on passkeys over the next few months.

Mar 13 2026, 7:09 PM · FY2025-26 WE4.6.2 Multiple Authenticators, Epic

Mar 12 2026

EMill-WMF added a comment to T399644: FY2025-26 WE4.6.2 Multiple Authenticators.

@andritolion What kind of authenticators are you using?

Mar 12 2026, 3:12 PM · FY2025-26 WE4.6.2 Multiple Authenticators, Epic
EMill-WMF assigned T419837: Temporary measurement of outbound citation link clicks to mszwarc.

Sharing this schema, used in some 2018 research.

Mar 12 2026, 2:31 PM · Product Safety and Integrity (Sprint Forsythia (Mar 23 - Apr 10))), MW-1.46-notes (1.46.0-wmf.20; 2026-03-17), Essential-Work
EMill-WMF added a comment to T419837: Temporary measurement of outbound citation link clicks.

Yeah, to be clear the idea here is to collect data on all (or at least above some popularity threshold) outbound citation links, not just ones to a particular service.

Mar 12 2026, 2:16 PM · Product Safety and Integrity (Sprint Forsythia (Mar 23 - Apr 10))), MW-1.46-notes (1.46.0-wmf.20; 2026-03-17), Essential-Work
EMill-WMF added a comment to T197160: All security-sensitive MediaWiki functionality should require elevated security.

However, I still think in most situations a password should be enough. Typically, the second factor is used to establish trust between the service (here Wikipedia) and the user's browser.

That's not how we think about the security model for two-factor authentication - it's there, and required for users with various kinds of powerful rights, because of the plausibility that someone's username and password becomes known by an attacker. Last year's account compromise incident was a reminder of how widespread stolen credentials are (whether from other breached services where passwords were reused, or compromised laptops someone logs in from, or other).

Yes, password can be stolen, and that is why you establish trust to the the user's browser, not only to his password. You don't need to re-confirm trust on each page view or even on each login. The trust token can be saved in a long term secure cookie (not readable from scripts).

Mar 12 2026, 2:06 PM · MediaWiki-Platform-Team (Radar), Security, User-Tgr, Epic, MediaWiki-Core-AuthManager
EMill-WMF updated the task description for T419837: Temporary measurement of outbound citation link clicks.
Mar 12 2026, 1:32 PM · Product Safety and Integrity (Sprint Forsythia (Mar 23 - Apr 10))), MW-1.46-notes (1.46.0-wmf.20; 2026-03-17), Essential-Work
EMill-WMF created T419837: Temporary measurement of outbound citation link clicks.
Mar 12 2026, 12:56 PM · Product Safety and Integrity (Sprint Forsythia (Mar 23 - Apr 10))), MW-1.46-notes (1.46.0-wmf.20; 2026-03-17), Essential-Work

Mar 11 2026

EMill-WMF added a comment to T197160: All security-sensitive MediaWiki functionality should require elevated security.

However, I still think in most situations a password should be enough. Typically, the second factor is used to establish trust between the service (here Wikipedia) and the user's browser.

Mar 11 2026, 2:17 PM · MediaWiki-Platform-Team (Radar), Security, User-Tgr, Epic, MediaWiki-Core-AuthManager

Mar 10 2026

EMill-WMF added a comment to T197160: All security-sensitive MediaWiki functionality should require elevated security.

I have two PCs and one laptop from which I contribute. I also use two phones. Passkeys are not that great for such a situation, to say the least. Password managers solve most problems that passkeys solve (2FA solves the rest of them) and support more setups.

Mar 10 2026, 8:41 AM · MediaWiki-Platform-Team (Radar), Security, User-Tgr, Epic, MediaWiki-Core-AuthManager

Mar 8 2026

EMill-WMF added a comment to T419152: Editing user JS/CSS pages of another user should require elevated security.

Just wanted to link to my comment in https://phabricator.wikimedia.org/T197160#11685043 for this thread as well, about how we've been thinking about re-auth -- which is definitely more streamlined than what people are currently experiencing with the quick patch we rolled out last week.

Mar 8 2026, 2:09 AM · MediaWiki-Platform-Team (Radar), Sustainability (Incident Followup), 2026-user-javascript-incident, Product Safety and Integrity, Security, MediaWiki-Core-AuthManager
EMill-WMF added a comment to T197160: All security-sensitive MediaWiki functionality should require elevated security.

If we make too many things require reauth then we run the risk of annoying users. We also run the risk of making entering your password a common occurance which could aid phising attacks

@Bawolff 's point is entirely valid, and was even more so when it was written 8 years ago. But...

In a previous job, the setup was that 2FA was via a Yubikey. We had those cute little things that plugged into a USB-A port and just had a nubbin sticking out. One lived in a port on my laptop all the time so re-authing was as simple as reaching out with a fingertip and tapping. Now we're in 2026 and this sort of tech has become ubiquitous even on consumer-level hardware. Right now, I'm working on my personal machine with Touch-ID, so basically the same setup.

Mar 8 2026, 1:54 AM · MediaWiki-Platform-Team (Radar), Security, User-Tgr, Epic, MediaWiki-Core-AuthManager

Mar 7 2026

EMill-WMF added a comment to T419318: Loading scripts or stylesheets from https://tools-static.wmflabs.org/cdnjs/ generates CSP warning.

Did functionality break, or are you just noting the error in the console? The error messages describe that these are report-only violations, so no further action was taken besides logging it.

Mar 7 2026, 5:29 PM · SecTeam-Processed, Security-Team, Product Safety and Integrity, ContentSecurityPolicy, 2026-user-javascript-incident

Mar 6 2026

EMill-WMF added a comment to T419215: Userscripts relying on VIAF not working anymore in Wikidata.

It is better to open a separate ticket (but you could include all of them at once in it).

Mar 6 2026, 6:59 PM · 2026-user-javascript-incident, Wikidata, ContentSecurityPolicy, Wikidata-Gadgets
EMill-WMF added a comment to T419232: CSP blocks access to iiif.archive.org; breaks script for pulling high-resolution scans from archive.org (for use at Wikisource).

We plan to re-enable this via the allowlist, thanks for flagging.

Mar 6 2026, 5:02 PM · 2026-user-javascript-incident, User-Inductiveload, All-and-every-Wikisource, ContentSecurityPolicy
EMill-WMF added a comment to T419215: Userscripts relying on VIAF not working anymore in Wikidata.

We plan to unbreak this by updating our allowlist - thanks for flagging.

Mar 6 2026, 5:01 PM · 2026-user-javascript-incident, Wikidata, ContentSecurityPolicy, Wikidata-Gadgets
EMill-WMF added a comment to T419197: new CSP only allows localhost over TLS.

We plan to add support for http://localhost - thanks for flagging this.

Mar 6 2026, 5:01 PM · 2026-user-javascript-incident, Security-Team, ContentSecurityPolicy
EMill-WMF added a comment to T419237: Adopt process (or migrations) to ensure tools and scripts acessing "external" resources not unduly impacted by CSP changes..

I shared some broader thoughts on https://phabricator.wikimedia.org/T419234#11682841 - from that:

Mar 6 2026, 5:00 PM · Sustainability (Incident Followup), 2026-user-javascript-incident, Product Safety and Integrity, ContentSecurityPolicy
EMill-WMF added a comment to T419234: CSP blocks access to publicai-proxy.alaexis.workers.dev; breaks citation verification userscript.

Feel free to open a ticket to describe what broke and how you were using it. But just to be clear, our goal isn't to allow infinite developer flexibility here in pulling dynamically from third-party hosts (and we're not going to allowlist IP addresses, for instance, which change hands even more fluidly than domain names).

Mar 6 2026, 4:59 PM · 2026-user-javascript-incident, ContentSecurityPolicy
EMill-WMF added a comment to T419234: CSP blocks access to publicai-proxy.alaexis.workers.dev; breaks citation verification userscript.

To describe the two mitigations we put in place yesterday, I'll share here what I just posted on the Meta talk page:

Mar 6 2026, 4:48 PM · 2026-user-javascript-incident, ContentSecurityPolicy

Mar 2 2026

EMill-WMF added a comment to T415237: etherpad table size is 233GB / plan to delete all etherpads in April 2026.

Deleting these notes is not not primarily a technical issue, but rather a social or ethical issue. Can I request that someone from the Wikimedia Foundation who feels empowered to speak on social and ethical issues in community governance please identify themselves, make themselves a point of contact for social questions, and make a statement on deleting this content?

Mar 2 2026, 5:44 AM · User-notice, collaboration-services, Wikimedia-Etherpad, Data-Persistence

Feb 26 2026

EMill-WMF added a comment to T418484: Reconfigure autoconfirmed group so that account age is counted from first edit and not registration.

Taking a look at myself ( https://meta.wikimedia.org/wiki/Special:CentralAuth/Xaosflux ) - were it not that I had a global group, I would all of a sudden become un-autoconfirmed on ~591 projects, I don't think that is improving things.

Feb 26 2026, 7:30 PM · Product Safety and Integrity (Sprint Forsythia (Mar 23 - Apr 10))), Patch-For-Review, Wikimedia-Site-requests, User-notice, Essential-Work
EMill-WMF added a comment to T417824: Should we remove the Phabricator dump?.

No, I don't think this is resolved - please remove the current dump as well.

Feb 26 2026, 1:04 PM · Data-Engineering (Q3 FY25/26 January 1st - March 31th), Dumps-Generation, SecTeam-Processed, Phabricator, Release-Engineering-Team (Radar), collaboration-services, Security, Security-Team

Feb 23 2026

Restricted Application added a project to T321708: MediaWiki should support passwordless login with passkeys: Product Safety and Integrity.

@STei-WMF Reach out to us on Slack to work it out. We'll need to be precise about it, because...

Feb 23 2026, 1:06 AM · MW-1.46-notes (1.46.0-wmf.19; 2026-03-10), Product Safety and Integrity, FY2025-26 WE 4.6 - Account Security (WE 4.6.9 (Passwordless login and passkey promotion)), User-notice, MediaWiki-Platform-Team, MediaWiki-extensions-OATHAuth, MediaWiki-User-login-and-signup, MediaWiki-Core-AuthManager

Feb 19 2026

EMill-WMF added a comment to T417936: Potential changes to team-tagging Herald rules as a result of recent code-steward updates (Feb 2026).

Just flagging that I made some edits to the table to remove references to Trust and Safety Product - it had some wikitext markup around phab tags, so mentioning here in case something needs updating.

Feb 19 2026, 9:41 PM · Product Safety and Integrity (Sprint Flower (Feb 9 - Feb 27)), Community-Tech, MediaWiki-Platform-Team, Phabricator
EMill-WMF added a comment to T417141: [RFC] Wiki-E2EE Session @ WIkimedia Hackathon 2026.

In short, this is a technical exploration of MediaWiki as a trust anchor for external tools, without shifting any cryptographic or safety burden onto the Foundation.

Feb 19 2026, 2:19 AM · Privacy, Product Safety and Integrity

Feb 18 2026

EMill-WMF added a comment to T417824: Should we remove the Phabricator dump?.

Just to add my voice here - I would recommend we remove this dump. Given what Phabricator contains, I think the user benefit would at least need to be obvious and ongoing, and it doesn't sound like it is. I've certainly been involved in tickets that didn't start out appropriately access restricted, and it got noticed and done later - I'm sure others have had the same experience. Let's remove it, and if use cases come out of the woodwork that we should support, perhaps there are safer and more tailored ways to support them.

Feb 18 2026, 9:16 PM · Data-Engineering (Q3 FY25/26 January 1st - March 31th), Dumps-Generation, SecTeam-Processed, Phabricator, Release-Engineering-Team (Radar), collaboration-services, Security, Security-Team
EMill-WMF added a comment to T417141: [RFC] Wiki-E2EE Session @ WIkimedia Hackathon 2026.

Hi @valcio - thanks for opening this to get our thoughts. I want to be upfront that, while we of course believe in the availability of E2EE communication as a general matter, we're very unlikely to support Wikipedia offering an E2EE messaging system of its own. That would be a very significant area for the platform to expand in to, with both high technical and cryptographic complexity, and non-technical challenges to user safety, that organizations with a primary focus on private messaging are better suited to undertake. It's not just a matter of needing code to implement it. Not trying to tell you not to work on this, or projects like it - just that it is not something we would expect to devote resources to supporting here.

Feb 18 2026, 2:54 AM · Privacy, Product Safety and Integrity

Feb 17 2026

EMill-WMF updated subscribers of T415648: Add user account button to mobile web header.
Feb 17 2026, 2:38 PM · Growth-Team (FY2025-26 Q3 Sprint 6), MW-1.46-notes (1.46.0-wmf.20; 2026-03-17), OKR-Work (WE1 FY2025-26), MediaWiki-User-login-and-signup, MediaWiki-CreateAccount-page
EMill-WMF added a comment to T415237: etherpad table size is 233GB / plan to delete all etherpads in April 2026.

Just to +1 something @Ladsgroup said above, but hasn't been the main focus of the discussion:

Feb 17 2026, 2:58 AM · User-notice, collaboration-services, Wikimedia-Etherpad, Data-Persistence

Feb 14 2026

EMill-WMF closed T417136: mailman posts now show as being from the list instead of the original author as Declined.

Yes, @hashar you're right that this is a downside of the change we made to accommodate DMARC enforcement. Hopefully the context above (our list announcement, and the Mailman technical limitations) helps to explain why we made this choice.

Feb 14 2026, 10:27 AM · SRE, Wikimedia-Mailing-lists

Jan 16 2026

EMill-WMF added a comment to T414014: High volume of suspicious CSP reports for itwiki.

Indeed T391397 is the cause of that other rule. I think we should just ban their UA completely.

Jan 16 2026, 8:10 PM · FY2025-26 WE 4.6 - Account Security, SecTeam-Processed, Traffic, SRE, Security, Security-Team

Jan 9 2026

EMill-WMF added a comment to T411381: Security Issue Access Request for Novem Linguae.

@Novem_Linguae Thanks for your patience. Your request is approved.

Jan 9 2026, 4:04 PM · SecTeam-Processed, Security-Team, Security

Jan 5 2026

EMill-WMF added a comment to T260637: Discuss future of BotPasswords/OAuth IP "restrictions".

Also, given the apparent lack of interest by the security team, whom should it be discussed with?

Jan 5 2026, 12:16 AM · MediaWiki-Platform-Team, Platform Engineering, MediaWiki-User-management, MediaWiki-extensions-OAuth, Security

Jan 4 2026

EMill-WMF added a comment to T408383: False positives of lost access to wiki account ("You need to verify your login").

@Taylor No. This is not a venue for distributing any software to end users, malicious or benevolent. Do not post any further executables here.

Jan 4 2026, 10:49 PM · Product Safety and Integrity, Trust-and-Safety, Security

Dec 19 2025

EMill-WMF added a comment to T396155: [Epic] Improve verification email (WE1.1.22 FY2025-26).

Ah, I see @KStoller-WMF moved the discussion to T413130, sorry for extending this unnecessarily. As you can see there, we did adjust the language in a way that keeps things simple, while also partially resolving some of the points raised (it still has "Confirm email" on the button, but uses "confirm your email address" for context in the narrative above).

Dec 19 2025, 9:10 PM · OKR-Work (WE1 FY2025-26), Growth-Team, Epic, MW-1.46-notes (1.46.0-wmf.4; 2025-11-25), User-notice, MediaWiki-Email, GrowthExperiments
EMill-WMF added a comment to T396155: [Epic] Improve verification email (WE1.1.22 FY2025-26).

It's not a matter of brevity v. precision. It's a matter of something that doesn't make sense v. something that does. The current wording doesn't make sense. At en.WP's village pump, another editor suggests "Your Wikipedia account setup is almost complete". That would work too.

Dec 19 2025, 9:08 PM · OKR-Work (WE1 FY2025-26), Growth-Team, Epic, MW-1.46-notes (1.46.0-wmf.4; 2025-11-25), User-notice, MediaWiki-Email, GrowthExperiments

Dec 16 2025

EMill-WMF added a comment to T412120: Security Issue Access Request for MLechvien-WMF.

@MLechvien-WMF This is approved - as @sbassett said, thanks for your patience.

Dec 16 2025, 2:45 AM · SecTeam-Processed, Security-Team, Security

Dec 12 2025

EMill-WMF updated the task description for T412222: Update temporary account creation rate limits.
Dec 12 2025, 6:30 PM · Product Safety and Integrity (Sprint Mince Pie Dec 1 - Dec 12), Temporary accounts
EMill-WMF added a comment to T411607: Security Issue Access Request for Blake.

Thanks, @Blake - this is approved from our side. @sbassett could you add @Blake?

Dec 12 2025, 12:47 PM · SecTeam-Processed, Security-Team, Security

Dec 8 2025

EMill-WMF added a comment to T180896: Allow functionaries to reset second factor on low-risk accounts.

If this is chosen we may still want a technical measure preventing them from remove 2FA from users with advanced right.

Dec 8 2025, 3:54 AM · Trust-and-Safety, SecTeam-Processed, Security-Team, Security, MediaWiki-extensions-OATHAuth, WMF-Legal, MW-1.34-notes (1.34.0-wmf.1; 2019-04-16)
EMill-WMF added a comment to T368344: Proposal: fail explicitly and revoke relevant API keys over plain-text HTTP connection for all Wikimedia APIs.

Personally, I'd rather we put effort into eliminating port 80.

Dec 8 2025, 3:35 AM · Security, MW-Interfaces-Team, Traffic, HTTPS, Wikimedia Enterprise, RESTBase-API, MediaWiki-REST-API, MediaWiki-Action-API

Dec 7 2025

EMill-WMF added a comment to T411927: Temporary account adding URL on first Publish attempt gets hCaptcha request, but no popup..

Just flagging that we are tracking this bug - thanks for documenting it here. Our initial team discussion about it suggests this is an unintended byproduct of running enwiki in 100% passive mode, and that it will be addressed when we move to 99.9% passive mode (which is scheduled for tomorrow morning, Monday).

Dec 7 2025, 9:16 PM · Product Safety and Integrity, WE4.2 Bot detection (WE4.2 hCaptcha editing trial), ConfirmEdit (CAPTCHA extension)

Dec 4 2025

EMill-WMF added a comment to T411607: Security Issue Access Request for Blake.

Thanks @Blake - could you give some more detail about the kind of security issues your work will need access to?

Dec 4 2025, 6:19 PM · SecTeam-Processed, Security-Team, Security

Nov 28 2025

EMill-WMF added a comment to T409718: Remove $wgCheckUserGroupRequirements and related code.

Yay for deleting code!!

Nov 28 2025, 7:08 PM · MW-1.45-notes, MW-1.46-notes (1.46.0-wmf.5; 2025-12-02), Product Safety and Integrity (Crepes au Chocolat (Sprint Nov 10 - Nov 28)), CheckUser, MediaWiki-User-management

Nov 24 2025

EMill-WMF added a comment to T408592: Request: Wikipedia 25 microsite hosting.

Who will be responsible for security review, when this is sharing important top level domains ?

@TheDJ Could it be possibly handled or at least initiated by me and the Reader Experience team?

I am working together with the Reader Experience team to deliver a Mediawiki extension for the same initiative, which will also requires a security review. We have been told to make an initial security review ourselves, and schedule an official review by the security team for whenever possible, as they are overloaded with review requests and have a waiting list of a couple of months.

To add on, what about the maintenance of package.json and the dependencies that it pulls in?

@BCornwall For the first 2 months after publishing the website - it will be me. After that period, I will hand over to the Reader Experience team.

Nov 24 2025, 2:02 PM · Patch-For-Review, collaboration-services, SRE, PES1.3.3 WP25 Easter Eggs

Nov 22 2025

EMill-WMF added a comment to T409911: hCaptcha: Submit button unresponsive after hCaptcha error.

Note that concerns have been raised about the inability of sending the form if the connection is lost after loading the edit form but before the used interacts with it (i.e. before there is a chance to load hCaptcha's SDK). This discussion is blocking merging that patch.

Nov 22 2025, 3:37 AM · Product Safety and Integrity (Sprint Daffodil (Jan 19 - Feb 6)), MW-1.46-notes (1.46.0-wmf.7; 2025-12-16), ConfirmEdit (CAPTCHA extension), WE4.2 Bot detection (WE4.2 hCaptcha editing trial)
EMill-WMF added a comment to T410386: Prompt user to create a regular account after temp account creation rate limit trip.

Switching to my volunteer Steward Liason role: We should be extra careful here before we make it happen. Assuming the rate limit between named and temporary accounts is not shared, switching to regular accounts when temporary ones are exhausted (or vice-versa) is the quickest way to bypass Six Account Limit (and make it a Twelve-Account-Limit instead). I'm not 100% sure how to account for this, but we should consider this risk and incorporate it into the decisions we make here.

CC @EMill-WMF @Tchanders, as I'm fairly certain enwiki would consider this extra risk for their usage as well (that said, I'm not an enwiki user, so...).

Hope this makes sense!

Nov 22 2025, 3:31 AM · Temporary accounts, Product Safety and Integrity, Growth-Team
EMill-WMF added a comment to T408025: Make RecoveryCodeCountPresentationModel useful again.

I do think both is the correct answer - I posted in https://phabricator.wikimedia.org/T406281 with some thoughts there.

Nov 22 2025, 3:22 AM · FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

To be clear, I don't mean implementing all of those things as part of this ticket. I mean that I assume that it might make sense to create a post-login point that checks a variety of conditions that might trigger an interstitial, so that it's pretty straightforward to add those other sorts of examples going forward.

Nov 22 2025, 3:22 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

This functionality is likely only necessary under the single recovery code model which, as has been noted, is not the current configuration within Wikimedia production and likely never will be again.

Nov 22 2025, 3:20 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)
EMill-WMF moved T409259: Security Issue Access Request for Peter from Our Part Is Done to In Progress on the Security-Team board.
Nov 22 2025, 12:22 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF reopened T409259: Security Issue Access Request for Peter as "Open".
Nov 22 2025, 12:22 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T409259: Security Issue Access Request for Peter.

@Peter Could you put some more rationale on the ticket here, about why work related to IP blocking of Beta cluster involves needing access to security tickets on phabricator?

Nov 22 2025, 12:19 AM · SecTeam-Processed, Security-Team, Security

Nov 16 2025

EMill-WMF added a comment to T402089: Make LoginNotify cookie expiry longer than login cookie expiry (with "remember me").

Yes, this change makes sense to me from a product and user safety perspective.

Nov 16 2025, 7:18 PM · Community-Tech, Security, MediaWiki-extensions-LoginNotify

Nov 13 2025

EMill-WMF added a comment to T408011: Design Research: Prompt user to create a regular account after temp account creation rate limit trip.

Good points on the accordion - I was not thinking at all about other languages. I defer to what you think best. Among the above visual proposals, I like the accordion version, and the rightmost version (the smallest text) the most.

Nov 13 2025, 10:04 PM · Growth-Team (FY2025-26 Q2 Sprint 3), Essential-Work, Design, Temporary accounts, Product Safety and Integrity

Nov 12 2025

EMill-WMF added a comment to T408011: Design Research: Prompt user to create a regular account after temp account creation rate limit trip.

For the message, I would remove the "Why do I need an account?" subheader and expander/collapser, and say something in active voice. (Also, we don't like to say "anonymous editing", as registering a user account is, if anything, more privacy-protective.)

Nov 12 2025, 8:19 PM · Growth-Team (FY2025-26 Q2 Sprint 3), Essential-Work, Design, Temporary accounts, Product Safety and Integrity

Oct 31 2025

EMill-WMF added a comment to T408930: Inform privileged users that they are required to have 2FA on the main Special:AccountSecurity page.

I think this would also be an opportunity to have a UWER-focused message to add as many options/passkeys as possible.

Oct 31 2025, 5:18 PM · Product Safety and Integrity, MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Oct 27 2025

EMill-WMF added a comment to T408383: False positives of lost access to wiki account ("You need to verify your login").

@Taylor As I said in my reply on https://www.mediawiki.org/wiki/Project:Support_desk/Archive_23#Obligatory_security_rules_that_users_cannot_decide - we do understand that email checks add real imposition for users who routinely clear cookies and change IPs. To clear up some things I think you may not understand about the two options I described there (keeping a cookie, and 2FA):

Oct 27 2025, 2:37 PM · Product Safety and Integrity, Trust-and-Safety, Security

Oct 23 2025

EMill-WMF added a comment to T101017: Early security release access for Lcawte (ShoutWiki).

Just FYI (and likely many years beyond relevance at this point), but we now have #acl_release_security_pre_announce, which is used to subscribe trusted mediawiki operators to high/critical MediaWiki bugs prior to their release. Folks can request to be added to this group (via a new, Security-Team -tagged Phabricator task) and they will then be vetted by the Product Safety and Integrity team.

Oct 23 2025, 4:04 AM · SecTeam-Processed, ShoutWiki, WMF-Legal
EMill-WMF closed T407666: Early access request for wiki.gg to pre-announce security fixes as Declined.

To follow up, and with apologies for the conflicting comments in the two tasks, the policy is as I described above - the group is not open for applications, and has no guarantees associated with it. I'll add a comment to the other task to clarify there as well.

Oct 23 2025, 3:59 AM · SecTeam-Processed, Security, Security-Team

Oct 22 2025

EMill-WMF added a comment to T241921: Fix Wikimedia captchas.

To note here, hCaptcha is now running in production for Special:CreateAccount on English Wikipedia, test2wiki, and several other production wikis. We encourage folks on this thread interested in improving accessibility to try it out. For example, we'd be interested in hearing what the screen reader experience is like. test2wiki is likely the most appropriate place for testing that actually creates new accounts.

Oct 22 2025, 8:21 PM · WE4.2 Bot detection, Security, Security-Team, Stewards-and-global-tools, ConfirmEdit (CAPTCHA extension), UX-Debt, Accessibility, Epic
EMill-WMF added a comment to T6845: CAPTCHA doesn't work for people with visual impairments.

To note here, hCaptcha is now running in production for Special:CreateAccount on English Wikipedia, test2wiki, and several other production wikis. We encourage folks on this thread interested in improving accessibility to try it out. For example, we'd be interested in hearing what the screen reader experience is like. test2wiki is likely the most appropriate place for testing that actually creates new accounts.

Oct 22 2025, 8:21 PM · SecTeam-Processed, ConfirmEdit (CAPTCHA extension), Accessibility, Design, WCAG-Level-A
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

Just to mention here as well - https://phabricator.wikimedia.org/T407167 is resolved, since we have reverted back to 10 user codes. The goal had been to simplify the recovery code experience, and we relaxed the reauth timer to go along with these changes to reduce lockout risk, but this just wasn't a good enough solution. We'll be more cautious before adjusting this again.

Oct 22 2025, 2:06 PM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Oct 21 2025

EMill-WMF added a comment to T407859: Add limit to number of 2FA devices.

We had briefly discussed this last quarter, and I had suggested 100. That's still my suggestion - something impractical for normal usage to reach, but still a normal system operations cap.

Oct 21 2025, 2:25 PM · MW-1.46-notes (1.46.0-wmf.2; 2025-11-12), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T407666: Early access request for wiki.gg to pre-announce security fixes.

@RheingoldRiver I am sorry to give you a disappointing answer here, but the acl*release_security_pre_announce group is not open for applications.

For the record, I feel like the point should be made that this seems to conflict with what was said in T101017#11285755 a few days ago (my emphasis added):

Just FYI (and likely many years beyond relevance at this point), but we now have #acl_release_security_pre_announce, which is used to subscribe trusted mediawiki operators to high/critical MediaWiki bugs prior to their release. Folks can request to be added to this group (via a new, Security-Team -tagged Phabricator task) and they will then be vetted by the Product Safety and Integrity team.

Oct 21 2025, 11:19 AM · SecTeam-Processed, Security, Security-Team
EMill-WMF closed T407666: Early access request for wiki.gg to pre-announce security fixes as Declined.

@RheingoldRiver I am sorry to give you a disappointing answer here, but the acl*release_security_pre_announce group is not open for applications. It is extremely small, rarely used (just once so far), and invite-only. It does not have any SLAs/SLOs -- we make no promises around it, and it may or may not ever become a formal process. We could make this more clear in the description for the group, so we will do that to avoid mismanaging expectations.

Oct 21 2025, 2:20 AM · SecTeam-Processed, Security, Security-Team

Oct 9 2025

EMill-WMF added a comment to T406619: Security Issue Access Request for SLong-WMF (Sean Long).

@sbassett Yep.

Oct 9 2025, 2:10 AM · SecTeam-Processed, Security-Team, Security

Oct 6 2025

EMill-WMF updated subscribers of T405926: Security Issue Access Request for Jsn.sherman.

@sbassett Thanks - I spoke with @Samwalton9-WMF (who we recently granted access to), and confirmed that @jsn.sherman is the tech lead for that project and has a similar need for access as Sam does. Thumbs up from me.

Oct 6 2025, 3:14 PM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

are we suggesting to show this message to everyone? or for instance, if a person has already 1/2/... 2FA methods does it make sense to give them this advise?

I think it does, yes. You could have 15 2FA methods set up, but if you logged in with a recovery code, that probably means you don't have access to any of them. That might be OK because that lack of access might be temporary (e.g. you left your security key at home), which is why we shouldn't be extremely aggressive about it, but we should still encourage them to set up a new factor because that's the surest way for them to avoid locking themselves out.

among those ideas, my suggestion would go for 3 to sequence the communication.

With #3 I worry that people will miss it, especially on desktop where it's relatively small compared to the rest of the UI. I think toast notifications are good for success/confirmation messages where it's OK if the user doesn't see them, but for this I would prefer something more prominent like #1c or #2 (but with a warning message instead of an info message, and without the dismiss icon).

i've also included other type of communications like the "copied to clipboard" confirmation. if we find it too intrusive we could also consider using the cdx-tooltip instead of a cdx-message.

I think the copied confirmation is fine as you've designed it.

Oct 6 2025, 12:41 PM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Oct 3 2025

EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

I like this. @AAlhazwani-WMF or @KColeman-WMF what do you think?

Oct 3 2025, 3:04 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Sep 30 2025

EMill-WMF updated EMill-WMF.
Sep 30 2025, 11:47 PM

Sep 25 2025

EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

Yes, I can see the dashboards I was intending to now! Thank you very much for everyone who helped resolve my issue, and apologies for my difficulty understanding some of the finer points around our access management.

Sep 25 2025, 4:58 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 20 2025

EMill-WMF moved T404903: Grant Access to analytics-privatedata-users for ericmill from Awaiting User Input to Backlog on the LDAP-Access-Requests board.
Sep 20 2025, 6:57 PM · SRE-Access-Requests, Data-Engineering, SRE
EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

The docs say membership in wmf should be enough to log into superset. Can you not log into it?

Or can you log into it but this request is specifically about seeing more private data including PII ?

Sep 20 2025, 6:57 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 18 2025

EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

@Aklapper This: https://www.mediawiki.org/wiki/Product_Analytics/Superset_Access#Requesting_access Specifically, the this Phabricator form link.

Sep 18 2025, 8:39 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 17 2025

EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

I am not actually certain if I have shell access or not. My account at https://idm.wikimedia.org says my shell username is ericmill, but I don't recall specifically requesting shell access.

Sep 17 2025, 6:56 PM · SRE-Access-Requests, Data-Engineering, SRE
EMill-WMF created T404903: Grant Access to analytics-privatedata-users for ericmill.
Sep 17 2025, 6:55 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 9 2025

EMill-WMF added a comment to T403683: Rename 2FA methods to friendlier names.

This is part of an initiative to make our on-wiki 2FA system more accessible and useful for a broader, less technical audience than is currently able/required to use 2FA today. As part of that, we're trying to remove as much technical nomenclature (including protocol names) from the copy and UX of the site. The users who would recognize the terms TOTP and WebAuthn are also the least likely to need help with this in the first place, so I think we should proceed with Authenticator app and Security key.

Sep 9 2025, 2:48 AM · MW-1.45-notes (1.45.0-wmf.20; 2025-09-23), MediaWiki-extensions-OATHAuth, FY2025-26 WE4.6.2 Multiple Authenticators
EMill-WMF added a comment to T403921: Re-enable WMF-NDA access for Siko_WMDE.

That initiative was just about 2FA access, not retroactively re-evaluating anything else, so I think we should proceed and re-enable.

Sep 9 2025, 2:28 AM · SecTeam-Processed, Security, Security-Team

Sep 5 2025

EMill-WMF added a comment to T362715: Move credentials change to central domain.

@EMill-WMF will decide that based on T401742.

Sep 5 2025, 7:46 PM · MW-1.45-notes (1.45.0-wmf.25; 2025-10-28), MW-1.44-notes (1.44.0-wmf.27; 2025-04-29), Patch-For-Review, SUL3, MediaWiki-extensions-OATHAuth, MediaWiki-Core-AuthManager, MediaWiki-Platform-Team, MediaWiki-extensions-CentralAuth
EMill-WMF added a comment to T403829: hCaptcha: Self-host secure-api.js code.

To be clear, the main goal here is to remove the risk of unexpected changes (including compromise) of the part of the JavaScript that necessarily has access to the parent document context before establishing the iframes that the rest of the code is then loaded into.

Sep 5 2025, 2:37 PM · WE4.2 Bot detection (WE4.2 hCaptcha editing trial), Product Safety and Integrity, ConfirmEdit (CAPTCHA extension)
EMill-WMF added a comment to T401772: Allow TOTP auth methods to be named.

Would it makes sense to pre-fill this with something generic ("authenticator app") for the user's first TOTP key, to reduce friction? (The names will eventually be editable, right?) Or make it clearly optional?

Sep 5 2025, 1:47 PM · MW-1.46-notes (1.46.0-wmf.1; 2025-11-05), Product Safety and Integrity (Sprint Mint Choc Chip Ice Cream (Oct 20 - Nov 7)), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T403683: Rename 2FA methods to friendlier names.

Security key

This term can instead mean any 2FA token regardless of type. Also it is too similar to "security code" proposed in T159915: Remove the word "CAPTCHA" from all Wikimedia user interface strings (though I oppose the latter task).

Sep 5 2025, 1:26 PM · MW-1.45-notes (1.45.0-wmf.20; 2025-09-23), MediaWiki-extensions-OATHAuth, FY2025-26 WE4.6.2 Multiple Authenticators

Aug 26 2025

EMill-WMF added a comment to T22326: Option to strip some metadata on upload (GPS/geolocation privacy).

Let's focus conversation on the most technically reasonable way to reflect a user's choice to remove lat/long (and other data extracted from the EXIF) at upload time from the form, and reflect those choices in the EXIF data of the resulting publicly available image.

Aug 26 2025, 3:38 AM · SecTeam-Processed, Security-Team, Patch-For-Review, UploadWizard, Privacy, MediaWiki-Uploading

Aug 23 2025

EMill-WMF closed T401179: Security Issue Access Request for Sadiya.Mohammed_WMDE as Declined.

@karapayneWMDE Just being a developer on a significant project isn't enough to grant full security issue access, which cuts much wider than any one project. (To be clear, this is the position we're maintaining for WMF as well.) If you're experiencing issues in your work, feel free to reach out separately to discuss it.

Aug 23 2025, 7:05 PM · SecTeam-Processed

Aug 14 2025

EMill-WMF added a comment to T401775: Allow 2FA methods to be renamed.

This is clearly nice, though I think it would be bearable for this feature to show up post-launch if we needed to descope something.

Aug 14 2025, 2:41 AM · Product Safety and Integrity, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T401773: Always redirect 2FA management special page to auth domain on SUL wikis, so that WebAuthn setup can be offered.

What about (in addition) redirecting https://en.wikipedia.org/wiki/Special:Manage_Two-factor_authentication (and other non-auth domain URLs to this same page on other wikis) to the auth domain version of it at https://auth.wikimedia.org/wiki/Special:Manage_Two-factor_authentication ?

Aug 14 2025, 2:38 AM · MW-1.45-notes (1.45.0-wmf.21; 2025-09-30), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), FY2025-26 WE4.6.2 Multiple Authenticators, MediaWiki-extensions-OATHAuth

Aug 13 2025

EMill-WMF closed T401008: Security Issue Access Request for zoe as Declined.
Aug 13 2025, 1:28 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T401008: Security Issue Access Request for zoe.

If that's the threshold I think I probably don't meet it. I can keep being manually added to tickets on a need-to-know basis.

Aug 13 2025, 1:28 AM · SecTeam-Processed, Security-Team, Security

Aug 8 2025

EMill-WMF updated subscribers of T401132: Security Issue Access Request for Samwalton9-WMF.

From the Security side, we're good to go on this - @Samwalton9 leads product development on moderator tools that a heavy overlap with security and privacy efforts.

Aug 8 2025, 9:50 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T401262: Security Issue Access Request for MMoss_WMF.

From the Security side, we're good to go on this - @MMoss_WMF works closely with us on security and privacy issues and may need access to tickets on a regular basis to support their work.

Aug 8 2025, 9:49 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T401179: Security Issue Access Request for Sadiya.Mohammed_WMDE.

We'll also need significantly more context to support approval than is present on this ticket. Please include a more detailed rationale (while remembering that this is a public ticket).

Aug 8 2025, 9:26 AM · SecTeam-Processed